{"vulnerability": "CVE-2025-37755", "sightings": [{"uuid": "74cd214f-ecdb-4482-9c9e-ab58ea30d8e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37755", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14269", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37755\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet: libwx: handle page_pool_dev_alloc_pages error\n\npage_pool_dev_alloc_pages could return NULL. There was a WARN_ON(!page)\nbut it would still proceed to use the NULL pointer and then crash.\n\nThis is similar to commit 001ba0902046\n(\"net: fec: handle page_pool_dev_alloc_pages error\").\n\nThis is found by our static analysis tool KNighter.\n\ud83d\udccf Published: 2025-05-01T12:55:59.499Z\n\ud83d\udccf Modified: 2025-05-01T12:55:59.499Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/c17ef974bfcf1a50818168b47c4606b425a957c4\n2. https://git.kernel.org/stable/c/ad81d666e114ebf989fc9994d4c93d451dc60056\n3. https://git.kernel.org/stable/c/1dd13c60348f515acd8c6f25a561b9c4e3b04fea\n4. https://git.kernel.org/stable/c/90bec7cef8805f9a23145e070dff28a02bb584eb\n5. https://git.kernel.org/stable/c/7f1ff1b38a7c8b872382b796023419d87d78c47e", "creation_timestamp": "2025-05-01T13:14:39.000000Z"}, {"uuid": "d983e43b-3eba-4bc0-8aab-2368366ba523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37755", "type": "seen", "source": "https://t.me/cvedetector/24213", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-37755 - Linux kernel: Net Device Page Pool Allocation NULL Pointer Dereference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-37755 \nPublished : May 1, 2025, 1:15 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnet: libwx: handle page_pool_dev_alloc_pages error  \n  \npage_pool_dev_alloc_pages could return NULL. There was a WARN_ON(!page)  \nbut it would still proceed to use the NULL pointer and then crash.  \n  \nThis is similar to commit 001ba0902046  \n(\"net: fec: handle page_pool_dev_alloc_pages error\").  \n  \nThis is found by our static analysis tool KNighter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T16:30:05.000000Z"}, {"uuid": "df4e4327-d0db-49a7-aace-637d533f9587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37755", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo4hlr7ybx2h", "content": "", "creation_timestamp": "2025-05-01T13:55:42.070482Z"}]}